Volgen
Ben Smyth
Ben Smyth
Founder-CEO, x26.io
Geverifieerd e-mailadres voor bensmyth.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
ProVerif 2.02 pl1: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
B Blanchet, B Smyth, V Cheval, M Sylvestre
556*2020
Election verifiability in electronic voting protocols
S Kremer, M Ryan, B Smyth
15th European Symposium on Research in Computer Security (ESORICS'10), 389-404, 2010
2472010
Attacking and fixing Helios: An analysis of ballot secrecy
V Cortier, B Smyth
Journal of Computer Security 21 (1), 89-148, 2013
2242013
A Fair and Robust Voting System by Broadcast
D Khader, B Smyth, PYA Ryan, F Hao
5th International Conference on Electronic Voting (EVOTE'12), 285-299, 2012
1162012
Adapting Helios for provable ballot privacy
D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi
16th European Symposium on Research in Computer Security (ESORICS'11), 335-354, 2011
1162011
Applied pi calculus
MD Ryan, B Smyth
Formal Models and Techniques for Analyzing Security Protocols, Chapter 6, 2011
1072011
Automatic verification of privacy properties in the applied pi calculus
S Delaune, M Ryan, B Smyth
2nd Joint iTrust and PST Conferences on Privacy, Trust Management and …, 2008
932008
Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators
B Smyth, M Ryan, L Chen
4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks …, 2007
852007
Towards automatic analysis of election verifiability properties
B Smyth, M Ryan, S Kremer, M Kourjieh
Joint Workshop on Automated Reasoning for Security Protocol Analysis and …, 2010
72*2010
Automated reasoning for equivalences in the applied pi calculus with barriers
B Blanchet, B Smyth
Journal of Computer Security 26 (3), 367-422, 2018
522018
Automated reasoning for equivalences in the applied pi calculus with barriers
B Blanchet, B Smyth
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 310-324, 2016
522016
Truncating TLS Connections to Violate Beliefs in Web Applications
B Smyth, A Pironti
WOOT'13: 7th USENIX Workshop on Offensive Technologies.(First appeared at …, 2013
51*2013
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
B Smyth, S Frink, MR Clarkson
48*2017
Ballot secrecy and ballot independence coincide
B Smyth, D Bernhard
European Symposium on Research in Computer Security, 463-480, 2013
43*2013
Formal verification of cryptographic protocols with automated reasoning
B Smyth
PhD thesis, School of Computer Science, University of Birmingham, 2011
432011
Secure authenticated key exchange with revocation for smart grid
F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012
362012
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th {USENIX} Security Symposium ({USENIX} Security 18), 1563-1580, 2018
312018
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
B Smyth
Journal of Computer Security, 1-61, 2021
27*2021
Authentication device, output device, verification device and input device
B Smyth, Y Hanatani, H Muratani
US Patent 9,509,492, 2016
222016
Automatically Checking Commitment Protocols in ProVerif without False Attacks
T Chothia, B Smyth, C Staite
222015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20